Geneva, Switzerland, 15-16 September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.

Slides:



Advertisements
Similar presentations
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Advertisements

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
A Comprehensive Study for RFID Malwares on Mobile Devices TBD.
Mobility in Government Consolidation & Wrap-up Lee Naik3 Oct 2013.
Cloud computing security related works in ITU-T SG17
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
BYOD: RISKS, MATURITY, AND SOLUTIONS ADAM ELY
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
SCRUB: Secure Computing Research for Users’ Benefit David Wagner 1.
(Geneva, Switzerland, September 2014)
Geneva, Switzerland, 4 December 2014 AFI Network & Digital Financial Service Policies & Regulations John V Owens, Senior Policy Advisor Digital Financial.
Geneva, Switzerland, November 2014 United Arab Emirates Experience Ahmad Alshamsi Manager Type Approval, UAE TRA Combating.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Lessons Learned in Smart Grid Cyber Security
INTEROP 2014 Mobile Issues in the Network. Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware,
Geneva, Switzerland, September 2014 Identity Based Attestation and Open Exchange Protocol (IBOPS) Scott Streit Chief Scientist.
IBM Mobile Security solutions 1IBM and Business Partner Sellers Only Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Device.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
Geneva, Switzerland, September 2014 X.509 in a changing world Erik Andersen, Andersen’s L-Service Denmark ITU Workshop on “ICT Security.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Geneva, Switzerland, September 2014 ITU-T SG 17 Identity management (IdM) Progress Report Abbie Barbir Ph.D., ITU-T Study Group 17 Q10/17 (Identity.
© 2012 IBM Corporation IBM Security Systems 1 © 2012 IBM Corporation Cloud Security: Who do you trust? Martin Borrett Director of the IBM Institute for.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
Moving to BYOD Gary Audin 1.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
© 2013 TM Forum | 1 V Catalysts and Innovation Projects Rapid Technology Innovation Projects The Hub at Management World 2013.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Total Enterprise Mobility Comprehensive Management and Security
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
The time to address enterprise mobility is now
A Shift in the Data Security Paradigm
Easily secure your EDGE data, unlock the value
Transforming business
Deployment Planning Services
Accelerate GDPR compliance with Microsoft 365
Cloud Security IS Application-Centric Security
Challenges facing Enterprise Mobility
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
YOUR DIGITAL TRANSFORMATION JOURNEY
practice-questions.html If you Are Thinking about your dumps? Introduction:
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
Office 365 with confidence: security features for Office 365
ITU-T Study Group 17 Security
Company Overview & Strategy
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Cloud Access Security Broker Lets Enterprises Enforce Security and Compliance in Office 365 Partner Logo “Skyhigh helps us securely enable high-impact.
Consulting Services for IoT
Strong Security for Your Weak Link:
Cloud & Developing Nations
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Security and business continuity in ICT : a case study by Orange
Contact Center Security Strategies
BluSync by ParaBlu Offers Secure Enterprise File Collaboration and Synchronization Solution That Uses Azure Blob Storage to Enable Secure Sharing MICROSOFT.
Enterprise Data Solution Running on the Azure Cloud Platform Protects, Preserves Critical Data “Druva takes a proactive approach to help customers address.
The MobileIron® Threat Detection difference:
Moderator Mohamed M. K. Elhaj
Data Governance & Management Skills and Experience
Presentation transcript:

Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director Mobile Security Advisor ITU Workshop on “ICT Security Standardization for Developing Countries” (Geneva, Switzerland, September 2014)

Geneva, Switzerland, September Secure Enterprise Mobility Abstract Mobility is forcing enterprises to migrate from current secure mobile solutions to newer offerings historically developed for consumer use. Enterprises face various risks, compliance and privacy decisions. Enterprises need to properly design mobile security solutions for both corporate, personal and consumer devices. Each solution presents unique challenges requiring the appropriate mobile security architecture and framework to protect user and consumer data.

Geneva, Switzerland, September Enterprise Mobile Security Threats Mobile usage is increasing. So are threats. Lost/stolen devices Data storage and sharing including cloud Mobile devices Insecure network connections Malware and viruses Mobile apps Application distribution ecosystem challenges Lack of standards with app stores Lack of developer standards Authentication Strong/known assurance levels

Geneva, Switzerland, September Protection against Enterprise Mobile Security Threats Clarity regarding corporate mobile policies Personally (BYOD) owned Corporate owned Consumer owned Create enterprise mobile security strategy Comprehensive mobile initiatives list Mobile ecosystem controls Mobile app governance Standard libraries/APIs across development teams Implement strong/multi authentication options Develop best practices for mobile Create Mobile Center of Excellence or Enterprise Mobile Security Forum to collaborate across teams